CSMA/CA Bottleneck Remediation in Saturation Mode with New Backoff Strategy

Size: px
Start display at page:

Download "CSMA/CA Bottleneck Remediation in Saturation Mode with New Backoff Strategy"

Transcription

1 CSMA/CA Bottleneck Remediation in Saturation Mode with New Backoff Strategy Baher Mawlawi, Jean-Baptiste Doré To cite this version: Baher Mawlawi, Jean-Baptiste Doré. CSMA/CA Bottleneck Remediation in Saturation Mode with New Backoff Strategy. 6th International Workshop on Multiple Access Communications, Dec 2013, Vilnius, Lithuania. pp.70-81, 2013, < / _7>. <hal > HAL Id: hal Submitted on 17 Dec 2014 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

2 CSMA/CA Bottleneck Remediation In Saturation Mode With New Backoff Strategy Baher Mawlawi 1,2,3, Jean-Baptiste Doré 1 1 CEA-Leti Minatec, 17 rue des Martyrs, Grenoble Cedex 9, France baher.mawlawi@cea.fr jean-baptiste.dore@cea.fr 2 University of Lyon, INRIA, Villeurbanne, France 3 INSA-Lyon, CITI-INRIA, F-69621, Villeurbanne, France Abstract. Many modern wireless networks integrate carrier sense multiple access/collision avoidance (CSMA/CA) with exponential backoff as medium access control (MAC) technique. In order to decrease the MAC overhead and the collision probability, we propose in this paper a new backoff strategy leading to better saturation throughput and access delay performance comparing to the classical protocol. We investigate the CSMA/CA with RTS/CTS technique, and we show that our strategy reaches better saturation throughput and access delay especially in dense networks. This proposed strategy distributes users over all the backoff stages to solve the bottleneck problem present in the first backoff stage. Finally, we analyze our strategy and we compare it to the classical one modeled by Markov chain. Analytical and simulation results show the improvment in term of saturation throughput. Cumulative density function (CDF) of the access delay illustrates the important gain obtained by the proposed strategy. Keywords: Carrier sense multiple access/collision avoidance(csma/ca), Markov chain, delay, throughput, backoff algorithm. 1 Introduction The design of wireless networks for local area communication attracted much of interest [1]. Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) protocols rely on a decentralized random packet transmission for the efficient use of shared medium. The key features of CSMA/CA is that each link with a pair of transmitter and receiver first senses the medium and transmits a packet only if the channel is sensed idle. Due to its simple and distributed nature, it has been considered as one of the most practical MAC protocols for wireless network. It has been adopted for instance for Wireless Local Area Networks (WLANs) through study group [2] and for Wireless Sensor Networks (WSNs) through [3]. This family of random access protocols is also a

3 good candidate for future communication systems such as cognitive radio [4], Machine to Machine (M2M) wireless networks and so on. Many previous works try to improve the throughput performance by attempting to optimize the contention window [5] [6] [7], but they are based on the IEEE backoff strategy. In [8], the throughput and the average access delay for different backoff algorithms were studied by simulation only. In the classical CSMA/CA protocol with backoff strategy modeled by Bianchi, it s clearly seen that the first state is the bottleneck of the system, especially in charged mode. In order to improve the throughput and the system delay we propose and develop in this paper a mathematical model for a new backoff strategy based on Markov chain and we analytically prove that the outcome of the new strategy is better than the classical one in terms of saturation throughput and statistical access delay. The paper is outlined as follows. We briefly review in Section 2 the RTS/CTS mechanisms of CSMA/CA protocol. In Section 3 we explain the proposed backoff strategy and we give a throughput analytical model. Section 4 presents the numerical results of the proposed protocol and a comparision with the classical protocol. Finally, Section 5 is reserved for conclusion. 2 CSMA/CA protocol MAC layer In order to describe the CSMA/CA protocol, we propose to explain the well known CSMA/CA MAC layer. The basic medium access mechanism of IEEE is DCF(Distributed Coordination Function) which uses CSMA/CA algorithm to serve shared medium access. It contains two different variants of access method, the basic access method and the optional channel access method with request-to-send (RTS) and clear-to-send (CTS) exchange. As the latter variant introduces more efficient performance in term of average throughput [9] and solves the hidden node problem [10], CSMA/CA with RTS/CTS will be investigated in this paper. Let s consider a network with many terminals and one access point. If the channel is busy for the transmitters, each one chooses randomly a backoff time (measured in time slots) in the interval [0, CW) where CW is the contention window. As long as the channel is sensed idle for a DIFS, i.e. distributed inter-frame space time, the timer(backoff) is decreased by one. When the channel is busy the timer counter is blocked and it resumes when the channel is idle again for at least a DIFS period. CW is an integer between CW min and CW max. After each unful transmission, CW is doubled up to the maximum value equal to CW max +1. The source transmits an RTS frame when the backoff reaches zero and wait for transmission permission (CTS) from the potential receiver before sending the current data packet. All stations located in the sender s range that hear the RTS packet should update their NAVs (Network Allocation vector) and defer their transmissions for the duration specified by the RTS. By this strategy, the transmission of data packets and the corresponding ACK can proceed without interference from other nodes. In addition, whenever erroneous frame is detected by a node, it defers its transmission by a fixed du-

4 State 0 CW0=CWmin collision State 1 CW1=2CW0 State 2 CW=2CW1 collision collision State N-1 CW=CWmax collision proposed Fig and proposed backoff strategy. ration indicated by EIFS, i.e., extended inter-frame space time. The contention window is initialized to CW min (minimum contention window). Dense networks cause collisions between transmitters. Each station involved in the collision double the size of its contention window. In case of a ful transmission, the transmitter re-initialize its contention window by CW min. 3 Proposed Backoff Algorithm Description 3.1 Description As explained in Section 2, when a station transmits fully it returns directly to the first backoff stage. This fact introduces a high collision probablity as well as an enormous additive transmission delay due to the high number of users in the same backoff stage (m = 1). This situation is seen as bottleneck problem. The proposed CSMA/CA is quite similar to the IEEE protocol (Section 2), the main difference remains in case of a ful (i.e. collision-free) transmission, the transmitting station reduces the value of its contention window by half, so as to keep its contention window at least equal to CW min (see Figure 1). 3.2 System Model In this section we will give the model, the analytical calculation of saturation throughput for the proposed CSMA/CA backoff strategy. We compute the probability of a packet transmission failure due to collision by assuming the following hypothesis [11]:

5 No hidden terminal and capture effect. Failed transmissions only occur as a consequence of collision. All stations are saturated, always having packets to send. For any given station, the probability of collision, p, is constant and independent of the station s collision history of the station and all other stations. The probability of collision does not depend on the backoff stage at which the transmission is made. All users have same bitrates and same amount of time to transmit. Using the Bianchi s model described in [9] [12] we model the proposed protocol by a Markov chain of m+1 backoff stages as illustrated Figure 2. Each stage of the Markov chain modelled the backoff counter. The number of states per stage is equaltothemaximumauthorizedvalueofthebackoffcounter,i.ecw i.itshould be mentioned that we use notations described in [9], i.e CW i = 2 i (CW min +1). When a collision occurs a transition from stage i to (i+1) is considered and p CW i. a random backoff will be chosen between 0 and CW i -1 with probability of A ful transmission is modelled by a transition from stage (i+1) to i and a random backoff will be chosen between 0 and CW i 1-1 with probability of 1 p CW i 1. Each state of this Markov process is represented by {s(t), b(t)}, where b(t) is the stochastic process representing the backoff time counter for a given station and s(t) is the stochastic process representing the backoff stage (0,1,...m) of the station at time t [9]. A discrete and integer time scale is adopted where t,(t+1) stands for the beginning of two consecutive slot times. We define p as the probability that, in a slot time, at least one of the N 1 remaining stations transmits. This probability can be expressed by: p = 1 (1 π) (N 1) (1) Where π is the probability that a station transmits a packet. It can be written by: m π = b i,0 (2) i=0 Where b i,k = lim t P{s(t) = i,b(t) = k},i (0,m),k (0,CW i 1) is the stationary distribution of the chain. Only b(i, 0) are considered because a transmission occurs when the backoff time counter is equal to zero. By considering the proposed Markov chain, b i,0 can be expressed as a function of p: { bi,0 = ( p 1 p )i b 0,0 0 < i m b i,k = CWi k CW i b i,0 0 < i m, 0 k CW i 1 (3) It should be noticed that this expression is different from the one expressed in [9], due to the proposed backoff strategy. By imposing the classical normalization

6 condition and considering Equation 3, b 0,0 can be expressed as a function of p: 1 = m i=0 = b 0,0 2 CW i 1 k=0 b i,k (W min +1+W min (1 p) m (2p) m + (1 p)m p m (1 2p)(1 p) m 1 (1 3p)(1 p) ) m 1 Where W min = CW min 1. Finally, combining equations (2),(3), and (4), the channel access probability π is equal to: m π = = i=0 m i=0 b i,0 ( ) i p b 0,0 1 p =b 0,0 (1 p) m p m (1 2p)(1 p) m 1 This two equations, (1) and (5), form a system of two nonlinear equations that has a unique solution and can be solved numerically for the values of p and π. The saturation throughput, which is the average information payload in a slot time over the average duration of a slot time, can be expressed using the classical expression [9]: E[Payload information transmitted in a slot time] τ = E[Duration of slot time] P s P tr L = P s P tr T s +P tr (1 P s )T c +(1 P tr )T id where P tr = 1 (1 π) N is the probability that there is at least one transmission in the considered slot time; L is the average packet payload size; T s is the average time needed to transmit a packet of size L (including the inter-frame spacing periods [12] ); P s = Nπ(1 π)n 1 1 (1 π) N is the probability of a ful transmission; T id is the duration of the idle period (a single slot time); and T c is the average time spent in the collision. T c and T s can be calculated for RTS/CTS transmission mode with [9]: T s =RTS +SIFS +σ +CTS +SIFS +σ +H +L +SIFS +σ +ACK +DIFS +σ T c =RTS +DIFS +σ where H, L, and ACK are the transmission times needed to send the packet header, the payload, and the acknowledgment, respectively. σ is the propagation delay. (4) (5) (6) (7)

7 4 Numerical Results In this Section we study the validity, the saturation throughput and the delay of the analytical proposed model. The system of two nonlinear equations (1) and (5) is solved numerically. The protocol and channel parameters adopted are those specified in Table 1. However analysis and results can be extended to others PHY layers. The minimal contention window (W min ) has been chosen constant and equal to 16. Table 1. PHY layer parameters Packet payload 8184 bits MAC header 272 bits PHY header 128 bits ACK length 112 bits + PHY header RTS length 160 bits + PHY header CTS length 112 bits + PHY header Channel Bit Rate 1 Mbit/s Propagation Delay 1 µs SIFS 28 µs Slot Time 50 µs DIFS 128 µs 4.1 Validation Of Analytical Results In order to validate the analytical model, the proposed backoff strategy is simulated for various number of mobile stations. Saturation throughput is computed for 2 different maximum backoff stages (m = 3 and m = 7). Figure 3 illustrates the relative error. The difference between the analytical and the simulated model is negligeable and it is due to the solve function tolerance as well as the finite number of iteration considered in the simulation. 4.2 System Performance In this Section, we study the performance of the proposed backoff strategy, so we compute the saturation throughput (bits/sec) vs the number of mobile stations for the RTS/CTS mode. RTS/CTS transmission mode is considered as it avoids the collision between the long data packets especially for high number of mobile stations. Figures 4 and 5 show that the saturation throughput in the proposed strategy is better than the saturation throughput in the classical CSMA/CA protocol with backoff strategy for RTS/CTS mechanism, and especially in the cases of large CW max (big m) independently from the number of mobile stations.

8 For example, in the proposed protocol and for CW max = 511 (m = 5) we can achieve better saturation throughput than the protocol with CW max = 2047 (m = 7). Numerical results show, as expected and due to lower probability of collision between transmitters, that the throughput increase when the number of states become higher. This fact is due to the distribution of all users within different backoff states, instead to be all located in the first state (bottleneck of classical protocol). Note that we don t take into consideration the retransmission limit and the maximum backoff stage as defined by the IEEE standard specification [13]. It should be mentioned that strategy has better performance for large number of users and m = 3 and it is due to the lack of spatial degree of liberty. 4.3 Statistical Delay Study Many previous works [8, 14 16] evaluates the system performance in term of delay by computing or simulating the average access delay. Since the average access delay isn t always a sufficient metric especially in VoIP applications, we go forward to simulate the cumulative density function(cdf) of the access delay. Figure 6 represents the CDF of the access delay for m = 3. It s seen clearly from Figure 6 that the delay of the proposed strategy is less than the classical one especially in charged mode (large number of mobile stations). It is due to the fact that users are distributed over all the stages instead to be located in the bottleneck (m = 1). Also, the proposed backoff strategy is much more robust with high states number (big m) thanks to the offered spatial liberty. Tables 2 and 3 give different delay values for some CDF with an idea about the gain introduced by our strategy. For instance, 99% of packets are transmitted with at most 17.6 ms (resp 13.9 ms) by the classical IEEE backoff while they are sent with at most 15.5 ms (resp 12.5 ms) by our proposed backoff strategy for m = 3 (resp m = 7). Table 2. Delay (ms) and gain (%) values in both backoff strategies for many CDF values with m = 3 CDF Proposed Backoff (ms) Classical Backoff (ms) Gain (%) 99% % % % Conclusion In this paper, we proposed and developped an analytical model for a new backoff strategy for CSMA/CA-CTS/RTS protocol. We validated the analytical model

9 Table 3. Delay (ms) and gain (%) values in both backoff strategies for many CDF values with m = 7 CDF Proposed Backoff (ms) Classical Backoff (ms) Gain (%) 99% % % % by simulations and we proved that the saturation throughput performance and the statistical access delay are improved especially in loaded systems. This proposed strategy could be a good candidate to solve the bottleneck problem existing in the classical IEEE backoff strategy. Our model assumes a finite number of terminals and ideal channel conditions. The model is suited for both Basic and RTS/CTS access mechanisms. To conclude, in this contribution we proposed a solution for the bottleneck problem, but still as future work to discuss the improvement relative to adaptive minimum contention window and to find an original manner to deal with different users bitrates. 6 Acknowledgment Authors wish to thank Prof. Jean-Marie Gorce and Dr. Nikolai Lebedev for their discussions and important remarks given following their intensive review for this work. References 1. K. Pahlavan and A. Levesque, Wireless data communications, Proceedings of the IEEE, vol. 82, no. 9, pp , sep Draft standard for information technology telecommunications and information exchange between systems local and metropolitan area networks specific requirements part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. amendment 3: mhz operation in usa (amendment to ieee ), IEEE Unapproved Draft Std P802.11y D7.0, Ieee tg 15.4, part 15.4:wireless medium access control (mac) and physical layer (phy) specifications for low rate wireless personal area network (lr-wpans), ieee-sa standard board, IEEE standard for Information Technology, no. 2, J. W. Chong, Y. Sung, and D. K. Sung, Rawpeach: Multiband csma/ca-based cognitive radio networks, Communications and Networks, Journal of, vol. 11, no. 2, pp , J. Yun and S. Bahk, Parallel contention algorithm with csma/ca for ofdm based high speed wireless lans, in Personal, Indoor and Mobile Radio Communications, PIMRC th IEEE Proceedings on, vol. 3, sept. 2003, pp vol Y. Xu, M. Huang, M. Lin, and Y. Zheng, A self-adaptive minimum contention window adjusting backoff algorithm in ieee dcf, in Consumer Electronics,

10 Communications and Networks (CECNet), nd International Conference on, april 2012, pp W. Ru-yan, W. Da-peng, and W. Mian, Contention awared adaptive backoff mechanism in ieee wireless lan, in Computational Intelligence and Software Engineering, CiSE International Conference on, dec. 2009, pp S.-W. Kang, J.-R. Cha, and J.-H. Kim, A novel estimation-based backoff algorithm in the IEEE based wireless network, in Consumer Communications and Networking Conference (CCNC), th IEEE, jan. 2010, pp M. H. Manshaei and J.-P. Hubaux, Performance analysis of the IEEE distributed coordination function: Bianchi model, March F. Tobagi and L. Kleinrock, Packet switching in radio channels: Part ii the hidden terminal problem in carrier sense multiple-access and the busy-tone solution, Communications, IEEE Transactions on, vol. 23, no. 12, pp , dec M. Fang, Power evaluation and performance enhancement of csma/ca based wlans, in Masters Thesis, Hamilton Institute, June G. Bianchi, Performance analysis of the ieee distributed coordination function, Selected Areas in Communications, IEEE Journal on, vol. 18, no. 3, pp , march Ieee standard for information technology- telecommunications and information exchange between systems- local and metropolitan area networks- specific requirements- part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications, ANSI/IEEE Std , 1999 Edition (R2003), pp. i 513, J. W. Chong, D. K. Sung, and Y. Sung, Cross-layer performance analysis for csma/ca protocols: Impact of imperfect sensing, Vehicular Technology, IEEE Transactions on, vol. 59, no. 3, pp , march H. Kwon, H. Seo, S. Kim, and B. G. Lee, Generalized csma/ca for ofdma systems: protocol design, throughput analysis, and implementation issues, Wireless Communications, IEEE Transactions on, vol. 8, no. 8, pp , august J. W. Chong, Y. Sung, and D. K. Sung, Analysis of csma/ca systems under carrier sensing error: Throughput, delay and sensitivity, in Global Telecommunications Conference, IEEE GLOBECOM IEEE, dec , pp. 1 6.

11 1-p 1/CW0 (0,0) (0,1) (0,2) (0,CW0-2) (0,CW0-1) p/cw1 (1-p)/p p/cwi-1 (i-1,0) (i-1,1) (i-1,2) (0,CWi-1-2) (0,CWi-1-1) p/cwi (i,0) (i,1) (i,2) (i,cwi-2) (i,cwi-1) p/cwi+1 (1-p)/p p/cwm-1 1 (m-1,0) (m-1,1) (m-1,2) 1 1 (m-1, CWm-1-2) 1 (m-1, CWm-1-1) p/cwm (m,0) (m,1) (m,2) (m,cwm-2) (m,cwm-1) p 1/CWm Fig. 2. Markov chain model of backoff window size in proposed CSMA/CA.

12 2 m=3 m=7 Relative Error (%) Number of Mobile Stations Fig. 3. Relative error vs number of mobile stations. 8.4 x 105 Saturation Throughput (bits/sec) m=3 m=4 8 m=5 m=6 m= Number of Mobile Stations Fig. 4. Saturation throughput for proposed strategy with RTS/CTS transmission.

13 8.4 x 105 Saturation Throughput (bits/sec) m=3 m= m=5 m=6 m= Number of Mobile Stations Fig. 5. Saturation throughput for classical FH with RTS/CTS transmission Classic Proposed CDF Delay Fig.6. CDF of access delay for m = 3 with 50 mobile stations. Delay is expressed in second.

Analysis of Frequency Channel Division Strategy for CSMA/CA with RTS/CTS Mechanism

Analysis of Frequency Channel Division Strategy for CSMA/CA with RTS/CTS Mechanism Analysis of Frequency Channel Division Strategy for CSMA/CA with RTS/CTS Mechanism Baher Mawlawi, Jean-Baptiste Doré, Nikolai Lebedev, Jean-Marie Gorce To cite this version: Baher Mawlawi, Jean-Baptiste

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Multiband CSMA/CA with RTS-CTS strategy

Multiband CSMA/CA with RTS-CTS strategy Multiband CSMA/CA with RTS-CTS strategy Baher Mawlawi, Jean-Baptiste Do, Nikolai Lebedev, Jean-Marie Gorce To cite this version: Baher Mawlawi, Jean-Baptiste Do, Nikolai Lebedev, Jean-Marie Gorce. Multiband

More information

CSMA/CA with RTS-CTS Overhead Reduction for M2M Communication

CSMA/CA with RTS-CTS Overhead Reduction for M2M Communication CSMA/CA with RTS-CTS Overhead Reduction for M2M Communication Baher Mawlawi, Jean-Baptiste Doré, Nikolai Lebedev, Jean-Marie Gorce To cite this version: Baher Mawlawi, Jean-Baptiste Doré, Nikolai Lebedev,

More information

WLAN Performance Aspects

WLAN Performance Aspects Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Collision Avoidance on Shared Slots in a Wireless Slotted Network: Models and Simulations

Collision Avoidance on Shared Slots in a Wireless Slotted Network: Models and Simulations Collision Avoidance on Shared Slots in a Wireless Slotted Network: Models and Simulations Pascale Minet, Paul Muhlethaler, Ines Khoufi To cite this version: Pascale Minet, Paul Muhlethaler, Ines Khoufi.

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs Initial Markov under Bianchi s École Polytechnique, Paris, France June 20th, 2005 Outline Initial Markov under Bianchi s 1 2 Initial Markov under Bianchi s 3 Outline Initial Markov under Bianchi s 1 2

More information

Throughput prediction in wireless networks using statistical learning

Throughput prediction in wireless networks using statistical learning Throughput prediction in wireless networks using statistical learning Claudina Rattaro, Pablo Belzarena To cite this version: Claudina Rattaro, Pablo Belzarena. Throughput prediction in wireless networks

More information

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Seongil Han, Yongsub Nam, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

Taking Benefit from the User Density in Large Cities for Delivering SMS

Taking Benefit from the User Density in Large Cities for Delivering SMS Taking Benefit from the User Density in Large Cities for Delivering SMS Yannick Léo, Anthony Busson, Carlos Sarraute, Eric Fleury To cite this version: Yannick Léo, Anthony Busson, Carlos Sarraute, Eric

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Robust IP and UDP-lite header recovery for packetized multimedia transmission

Robust IP and UDP-lite header recovery for packetized multimedia transmission Robust IP and UDP-lite header recovery for packetized multimedia transmission Michel Kieffer, François Mériaux To cite this version: Michel Kieffer, François Mériaux. Robust IP and UDP-lite header recovery

More information

Setup of epiphytic assistance systems with SEPIA

Setup of epiphytic assistance systems with SEPIA Setup of epiphytic assistance systems with SEPIA Blandine Ginon, Stéphanie Jean-Daubias, Pierre-Antoine Champin, Marie Lefevre To cite this version: Blandine Ginon, Stéphanie Jean-Daubias, Pierre-Antoine

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Enhanced Spatial Reuse in Multi-Cell WLANs

Enhanced Spatial Reuse in Multi-Cell WLANs Enhanced Spatial Reuse in Multi-Cell WLANs Thomas Bonald, Ali Ibrahim, James Roberts To cite this version: Thomas Bonald, Ali Ibrahim, James Roberts. Enhanced Spatial Reuse in Multi-Cell WLANs. Infocom,

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

Multimedia CTI Services for Telecommunication Systems

Multimedia CTI Services for Telecommunication Systems Multimedia CTI Services for Telecommunication Systems Xavier Scharff, Pascal Lorenz, Zoubir Mammeri To cite this version: Xavier Scharff, Pascal Lorenz, Zoubir Mammeri. Multimedia CTI Services for Telecommunication

More information

Tacked Link List - An Improved Linked List for Advance Resource Reservation

Tacked Link List - An Improved Linked List for Advance Resource Reservation Tacked Link List - An Improved Linked List for Advance Resource Reservation Li-Bing Wu, Jing Fan, Lei Nie, Bing-Yi Liu To cite this version: Li-Bing Wu, Jing Fan, Lei Nie, Bing-Yi Liu. Tacked Link List

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Wireless Networked Control System using IEEE with GTS

Wireless Networked Control System using IEEE with GTS Wireless Networked Control System using IEEE 802.5.4 with GTS Najet Boughanmi, Ye-Qiong Song, Eric Rondeau To cite this version: Najet Boughanmi, Ye-Qiong Song, Eric Rondeau. Wireless Networked Control

More information

An Improved IEEE CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays

An Improved IEEE CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays An Improved IEEE 802.11 CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays Nirmala Shenoy, John Hamilton, Andres Kwasinski and Kaiqi Xiong Rochester Institute of Technology,

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Research Article Performance Analysis of IEEE DCF under Nonsaturation Condition

Research Article Performance Analysis of IEEE DCF under Nonsaturation Condition Mathematical Problems in Engineering Volume 2008, Article ID 574197, 17 pages doi:10.1155/2008/574197 Research Article Performance Analysis of IEEE 802.11 DCF under Nonsaturation Condition Yutae Lee, 1

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

Simulations of VANET Scenarios with OPNET and SUMO

Simulations of VANET Scenarios with OPNET and SUMO Simulations of VANET Scenarios with OPNET and SUMO Florent Kaisser, Christophe Gransart, Marion Berbineau To cite this version: Florent Kaisser, Christophe Gransart, Marion Berbineau. Simulations of VANET

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

BoxPlot++ Zeina Azmeh, Fady Hamoui, Marianne Huchard. To cite this version: HAL Id: lirmm

BoxPlot++ Zeina Azmeh, Fady Hamoui, Marianne Huchard. To cite this version: HAL Id: lirmm BoxPlot++ Zeina Azmeh, Fady Hamoui, Marianne Huchard To cite this version: Zeina Azmeh, Fady Hamoui, Marianne Huchard. BoxPlot++. RR-11001, 2011. HAL Id: lirmm-00557222 https://hal-lirmm.ccsd.cnrs.fr/lirmm-00557222

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Study on Feebly Open Set with Respect to an Ideal Topological Spaces

Study on Feebly Open Set with Respect to an Ideal Topological Spaces Study on Feebly Open Set with Respect to an Ideal Topological Spaces Yiezi K. Al Talkany, Suadud H. Al Ismael To cite this version: Yiezi K. Al Talkany, Suadud H. Al Ismael. Study on Feebly Open Set with

More information

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Fu-Yi Hung ALL RIGHTS RESERVED

Fu-Yi Hung ALL RIGHTS RESERVED 009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks

Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless etworks Xiaohui Ye *, Xin Liu #, S. J. Ben Yoo *, and Zhi Ding * * Department of Electrical and Computer Engineering,

More information

Transmission Control Protocol over Wireless LAN

Transmission Control Protocol over Wireless LAN Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

An Efficient Numerical Inverse Scattering Algorithm for Generalized Zakharov-Shabat Equations with Two Potential Functions

An Efficient Numerical Inverse Scattering Algorithm for Generalized Zakharov-Shabat Equations with Two Potential Functions An Efficient Numerical Inverse Scattering Algorithm for Generalized Zakharov-Shabat Equations with Two Potential Functions Huaibin Tang, Qinghua Zhang To cite this version: Huaibin Tang, Qinghua Zhang.

More information

lambda-min Decoding Algorithm of Regular and Irregular LDPC Codes

lambda-min Decoding Algorithm of Regular and Irregular LDPC Codes lambda-min Decoding Algorithm of Regular and Irregular LDPC Codes Emmanuel Boutillon, Frédéric Guillou, Jean-Luc Danger To cite this version: Emmanuel Boutillon, Frédéric Guillou, Jean-Luc Danger lambda-min

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Hands-On Exercises: IEEE Standard

Hands-On Exercises: IEEE Standard Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Traffic Grooming in Bidirectional WDM Ring Networks

Traffic Grooming in Bidirectional WDM Ring Networks Traffic Grooming in Bidirectional WDM Ring Networks Jean-Claude Bermond, David Coudert, Xavier Munoz, Ignasi Sau To cite this version: Jean-Claude Bermond, David Coudert, Xavier Munoz, Ignasi Sau. Traffic

More information

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Characterising the Behaviour of IEEE 802.11 Broadcast Transmissions

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes SRN Model for IEEE 802.11 DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden des Osama Younes and Nigel Thomas School of Computing Science, Newcastle University, UK Email: {Osama.Younes Nigel.Thomas}

More information

THE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE PROTOCOL

THE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE PROTOCOL J. Appl. Math. & Computing Vol. 22(2006, No. 1-2, pp. 501-515 THE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE 802.11 PROTOCOL DONG HWAN HAN AND CHUL GEUN PARK Abstract. The IEEE 802.11

More information

Malware models for network and service management

Malware models for network and service management Malware models for network and service management Jérôme François, Radu State, Olivier Festor To cite this version: Jérôme François, Radu State, Olivier Festor. Malware models for network and service management.

More information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information Title Performance Analysis for Total Delay and Total Packe Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga Proceedings : APSIPA ASC 2009 : Asia-Pacific Signal Citationand Conference: 791-796

More information

Analysis of CSMA/CA Systems under Carrier Sensing Error: Throughput, Delay and Sensitivity

Analysis of CSMA/CA Systems under Carrier Sensing Error: Throughput, Delay and Sensitivity Analysis of CSMA/CA Systems under Carrier Sensing Error: Throughput, Delay and Sensitivity Jo oon Chong, Youngchul Sung, and Dan Keun Sung School of EECS, KAIST 373- Guseong-dong, Yuseong-gu, Daejeon 35-7,

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

The Proportional Colouring Problem: Optimizing Buffers in Radio Mesh Networks

The Proportional Colouring Problem: Optimizing Buffers in Radio Mesh Networks The Proportional Colouring Problem: Optimizing Buffers in Radio Mesh Networks Florian Huc, Claudia Linhares Sales, Hervé Rivano To cite this version: Florian Huc, Claudia Linhares Sales, Hervé Rivano.

More information

Removing the MAC Retransmission Times from the RTT in TCP

Removing the MAC Retransmission Times from the RTT in TCP Removing the MAC Retransmission Times from the RTT in TCP Eugen Dedu, Sébastien Linck, François Spies To cite this version: Eugen Dedu, Sébastien Linck, François Spies. Removing the MAC Retransmission

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

A Finite State Model for IEEE Wireless LAN MAC DCF

A Finite State Model for IEEE Wireless LAN MAC DCF First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer

More information

Moveability and Collision Analysis for Fully-Parallel Manipulators

Moveability and Collision Analysis for Fully-Parallel Manipulators Moveability and Collision Analysis for Fully-Parallel Manipulators Damien Chablat, Philippe Wenger To cite this version: Damien Chablat, Philippe Wenger. Moveability and Collision Analysis for Fully-Parallel

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

Fault-Tolerant Storage Servers for the Databases of Redundant Web Servers in a Computing Grid

Fault-Tolerant Storage Servers for the Databases of Redundant Web Servers in a Computing Grid Fault-Tolerant s for the Databases of Redundant Web Servers in a Computing Grid Minhwan Ok To cite this version: Minhwan Ok. Fault-Tolerant s for the Databases of Redundant Web Servers in a Computing Grid.

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

An Accurate Model for Energy Efficiency in IEEE WLANs

An Accurate Model for Energy Efficiency in IEEE WLANs An Accurate Model for Energy Efficiency in IEEE 802.11 WLANs Eleni-Constantina Davri, Emmanouil Kafetzakis, Kimon Kontovasilis, Charalabos Skianis National Centre for Scientific Research Demokritos, Athens,

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs International Journal of Wireless Information Networks, Vol. 10, No. 1, January 2003 ( 2003) The IEEE 802.11 Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs Eustathia Ziouva and Theodore

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Kernel perfect and critical kernel imperfect digraphs structure

Kernel perfect and critical kernel imperfect digraphs structure Kernel perfect and critical kernel imperfect digraphs structure Hortensia Galeana-Sánchez, Mucuy-Kak Guevara To cite this version: Hortensia Galeana-Sánchez, Mucuy-Kak Guevara. Kernel perfect and critical

More information

Wireless & Mobile Networking

Wireless & Mobile Networking Wireless & Mobile Networking CS 752/852 - Spring 2011 Lec #3: Medium Access Control - I Tamer Nadeem Dept. of Computer Science Data Link Layer (DLL) Main Task of the data link layer: Provide error-free

More information

Experimental Evaluation of an IEC Station Bus Communication Reliability

Experimental Evaluation of an IEC Station Bus Communication Reliability Experimental Evaluation of an IEC 61850-Station Bus Communication Reliability Ahmed Altaher, Stéphane Mocanu, Jean-Marc Thiriet To cite this version: Ahmed Altaher, Stéphane Mocanu, Jean-Marc Thiriet.

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

QuickRanking: Fast Algorithm For Sorting And Ranking Data

QuickRanking: Fast Algorithm For Sorting And Ranking Data QuickRanking: Fast Algorithm For Sorting And Ranking Data Laurent Ott To cite this version: Laurent Ott. QuickRanking: Fast Algorithm For Sorting And Ranking Data. Fichiers produits par l auteur. 2015.

More information

MC-CDMA Based IEEE Wireless LAN

MC-CDMA Based IEEE Wireless LAN MC-CDMA Based IEEE 802.11 Wireless LAN Georgios Orfanos Jörg Habetha Ling Liu Aachen Univ. of Technology D-52074 Aachen, Germany Philips Research Laboratories, D-52066 Aachen, Germany Aachen Univ. of Technology

More information

Supporting Deadline Monotonic Policy over Average Service Time Analysis

Supporting Deadline Monotonic Policy over Average Service Time Analysis Supporting Deadline Monotonic Policy over 802. Average Service Time Analysis Inès El Korbi Ecole Nationale des Sciences de l Informatique Laboratoire Cristal Université de la Manouba, 200 Tunisia ines.korbi@gmail.com

More information

Blind Browsing on Hand-Held Devices: Touching the Web... to Understand it Better

Blind Browsing on Hand-Held Devices: Touching the Web... to Understand it Better Blind Browsing on Hand-Held Devices: Touching the Web... to Understand it Better Waseem Safi Fabrice Maurel Jean-Marc Routoure Pierre Beust Gaël Dias To cite this version: Waseem Safi Fabrice Maurel Jean-Marc

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Branch-and-price algorithms for the Bi-Objective Vehicle Routing Problem with Time Windows

Branch-and-price algorithms for the Bi-Objective Vehicle Routing Problem with Time Windows Branch-and-price algorithms for the Bi-Objective Vehicle Routing Problem with Time Windows Estèle Glize, Nicolas Jozefowiez, Sandra Ulrich Ngueveu To cite this version: Estèle Glize, Nicolas Jozefowiez,

More information

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

The optimal routing of augmented cubes.

The optimal routing of augmented cubes. The optimal routing of augmented cubes. Meirun Chen, Reza Naserasr To cite this version: Meirun Chen, Reza Naserasr. The optimal routing of augmented cubes.. Information Processing Letters, Elsevier, 28.

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Decentralised and Privacy-Aware Learning of Traversal Time Models

Decentralised and Privacy-Aware Learning of Traversal Time Models Decentralised and Privacy-Aware Learning of Traversal Time Models Thanh Le Van, Aurélien Bellet, Jan Ramon To cite this version: Thanh Le Van, Aurélien Bellet, Jan Ramon. Decentralised and Privacy-Aware

More information

Modelling and simulation of a SFN based PLC network

Modelling and simulation of a SFN based PLC network Modelling and simulation of a SFN based PLC network Raul Brito, Gerd Bumiller, Ye-Qiong Song To cite this version: Raul Brito, Gerd Bumiller, Ye-Qiong Song. Modelling and simulation of a SFN based PLC

More information